Data Model

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6681801 Experts worldwide ranked by ideXlab platform

Acee Lindem - One of the best experts on this subject based on the ideXlab platform.

  • Routing Key Chain YANG Data Model
    2016
    Co-Authors: Yi Yang, Ing-wher Chen, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option(TCP-AO)).

  • Key Chain YANG Data Model
    2015
    Co-Authors: Ing-wher Chen, Yi Yang, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. A key chain is a list of elements each containing a key, send lifetime, accept lifetime, and algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, keys and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key.

Ing-wher Chen - One of the best experts on this subject based on the ideXlab platform.

  • Routing Key Chain YANG Data Model
    2016
    Co-Authors: Yi Yang, Ing-wher Chen, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option(TCP-AO)).

  • Key Chain YANG Data Model
    2015
    Co-Authors: Ing-wher Chen, Yi Yang, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. A key chain is a list of elements each containing a key, send lifetime, accept lifetime, and algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, keys and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key.

Yi Yang - One of the best experts on this subject based on the ideXlab platform.

  • Routing Key Chain YANG Data Model
    2016
    Co-Authors: Yi Yang, Ing-wher Chen, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option(TCP-AO)).

  • Key Chain YANG Data Model
    2015
    Co-Authors: Ing-wher Chen, Yi Yang, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. A key chain is a list of elements each containing a key, send lifetime, accept lifetime, and algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, keys and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key.

Vincent Razanajao - One of the best experts on this subject based on the ideXlab platform.

  • ANCIENT EGYPTIAN TEXTS IN CONTEXT. TOWARDS A CONCEPTUAL Data Model (THE THOT Data Model — TDM)
    Bulletin of The Institute of Classical Studies, 2016
    Co-Authors: Stéphane Polis, Vincent Razanajao
    Abstract:

    In this paper, we propose a conceptual Data Model which could be the basis for future implementations of Databases and digital corpuses of Ancient Egyptian texts that fully integrate the material dimensions of writing. The types of metaData that can be used for documenting the elements and relationships of this Model are discussed and the resources (URIs) available for its online implementation (in the perspective of the ‘linked open Data’ movement) are examined.

  • Ancient Egyptian texts in contexts. Towards a conceptual Data Model (the Thot Data Model - TDM)
    Bulletin of the Institute of Classical Studies, 2016
    Co-Authors: Stéphane Polis, Vincent Razanajao
    Abstract:

    [en] In this paper, we propose a conceptual Data Model that could be the basis for future implementations of Databases and digital corpuses of Ancient Egyptian texts that fully integrate the material dimensions of writing. The types of metaData that can be used for documenting the elements and relationships of this Model are discussed and the resources (URIs) available for its online implementation (in the perspective of the `linked open Data' movement) are examined.

Derek Yeung - One of the best experts on this subject based on the ideXlab platform.

  • Routing Key Chain YANG Data Model
    2016
    Co-Authors: Yi Yang, Ing-wher Chen, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option(TCP-AO)).

  • Key Chain YANG Data Model
    2015
    Co-Authors: Ing-wher Chen, Yi Yang, Derek Yeung, Zhaohui Zhang, Acee Lindem
    Abstract:

    This document describes the key chain YANG Data Model. A key chain is a list of elements each containing a key, send lifetime, accept lifetime, and algorithm. By properly overlapping the send and accept lifetimes of multiple key chain elements, keys and algorithms may be gracefully updated. By representing them in a YANG Data Model, key distribution can be automated. Key chains are commonly used for routing protocol authentication and other applications. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key.